OpenSMTPD 7.8.0p0 released
Contributed by grey on from the Simple Mail Transfer Pumpkins? dept.
OpenBSD Journal
Contributed by grey on from the Simple Mail Transfer Pumpkins? dept.
Contributed by grey on from the anagram release version numbers dept.
Brent Cook has announced that LibreSSL 4.1.2 and 4.2.1 have been released.
The release notes read:
Contributed by Peter N. M. Hansteen on from the BPF my daemons, Puffy! dept.
bpf(4)
interface to filter on the sockets they handle?
In a recent
message
to tech@ titled
bpf filtering on arbitrary sockets,
Damien Miller (djm@) presents a preliminary patch and explains,
List: openbsd-tech Subject: bpf filtering on arbitrary sockets From: Damien Miller <djm () mindrot ! org> Date: 2025-10-30 5:03:00 Hi, This is an idea that came up while talking with dlg@ about network daemons. Quite a few programs and daemons use SOCK_RAW to send link-level packets after pledge(). E.g. usr.sbin/relayd/check_icmp.c wants to send ICMP packets. The problem with this is that, if they get compromised, they still hold a very powerful socket that can send pretty much arbitrary packets. If one of these programs gets compromised then the attacker can pretty easily pivot through the existing raw socket.
veb(4) virtual Ethernet bridge VLAN awareContributed by Peter N. M. Hansteen on from the virtually bridging the LANs, really dept.
veb(4) virtual Ethernet bridge device is an OpenBSD feature that can make certain setups a lot more manageable than otherwise possible.
Now David Gwynne (dlg@) is fielding a patch on tech@ that would make veb(4) even more capable, by making the device vlan(4) aware.
In the message to tech@, David explains:
List: openbsd-tech Subject: make veb(4) VLAN aware From: David Gwynne <david () gwynne ! id ! au> Date: 2025-10-29 5:54:42 veb(4) is currently vlan unaware, meaning that it assumes that there's a single "namespace" for the mac addresses used by packets handled by the bridge. by default it blocks vlan (and svlan) packets, but if you allow it carry vlan packets it ignores the vlan tag when doing themacaddress lookups. addingvlanawareness means that everymacaddress the bridge learns is now associated with a vlan identifier (vid). ie, the same mac in two different vlans will get separate entries in the forwarding database.
Contributed by rueda on from the noble-puffy-prize dept.
The OpenBSD project has announced OpenBSD 7.8, its 59th release.
The new release contains a number of significant improvements, including but certainly not limited to:
vmm(4)/vmd(8) now support SEV-ES on AMD processorsvmd(8) send/receive functionality was removed [See commit]watch(1) utility added [See earlier report]acpiwmi(4) driver for ACPI Windows Management Instrumentation (WMI) [See earlier report]boot(8) "machine fwsetup" command for rebooting into the firmware user interfacerc.d(8) and rcctl(8) gained "-q" options [See commits]erspan(4) driver for ERSPAN Type II collection [See earlier report]bpflogd(8) has been added [See earlier report]pkg_add -u no longer advises file removal [See earlier report]acme-client(1) now supports draft-ietf-acme-profiles-00 specifications for certificate profiles, such as those offered by Let's Encrypt - see acme-client.conf(5) "profile" keywordTearFree option backported to modesetting(4) driver [See earlier report]libpng has been bundled into libfreetype for improved font rendering [See commits]stdio(3)'s FILE is now opaque [See earlier report]clang(1)/llvm/lld(1) updated to version 19 [See earlier report]ssh-agent(1) and sshd(8) listener sockets moved from /tmp to under ~/.ssh/agent [See earlier report]ssh(1)
configuration
directive,
RefuseConnection [See earlier report]ssh(1) now issues a warning when the connection negotiates a non-post-quantum key agreement algorithmSee the full changelog for more details of the changes made over this latest six month development cycle.
The
Installation Guide
details how to get the system up and running with a fresh install,
while those who already run earlier releases should follow the
Upgrade Guide,
in most cases using
sysupgrade(8).
Readers are encouraged to celebrate the new release by donating to the project to support further development of our favourite OS!
-current, chromium (and derivatives) now have VA-API supportContributed by rueda on from the smooth-and-cool dept.
Following
a discussion
on ports@,
Robert Nagy (robert@)
committed VA-API
[hardware-assisted video
- see previous report]
support to the
chromium,
iridium,
and ungoogled-chromium
ports.
Note that:
amd64 are just starting to become available.graphics/intel-media-driver [and/]or graphics/intel-vaapi-driver.Update:
Now disabled again.
Plus, we were wrong about Firefox. Thanks for the comments!
Contributed by Peter N. M. Hansteen on from the WiFi all chirpy dept.
The work is to be carried out by Stefan Sperling (stsp@) and Chirpy Software.
The announcement states,
This project delivers the second open-source implementation of WPA3, the current industry standard for Wi-Fi encryption, specifically for the OpenBSD operating system. Its code can also be integrated by other operating systems to enable modern Wi-Fi encryption, thereby enhancing the diversity and resilience of the global IT ecosystem.
The project has an October 2025 start date, which likely means that work to implement even better Wi-Fi support in our favorite operating system is already under way. Read more from the announcement at the NLNet Foundation website.
We look forward to seeing the tangible results in future commits!
Contributed by Peter N. M. Hansteen on from the TLS SSLithers out dept.
List: openbsd-announce Subject: LibreSSL 4.2.0 Released From: Brent Cook <busterb () gmail ! com> Date: 2025-10-14 14:19:28 We have released LibreSSL 4.2.0, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon. This is the first stable release for the 4.2.x branch, also to be available with OpenBSD 7.8 It includes the following changes from LibreSSL 4.1.0:
Contributed by Peter N. M. Hansteen on from the SSH! A more perfect 10 dept.
This is a bugfix release that supersedes the previously announced OpenSSH 10.1 in time for the general release.
From the release notes:
Changes since OpenSSH 10.1 ========================== This is a bugfix release, primarily to fix a problem that rendered ssh(1) unusable when ControlPersist was enabled.
Donate to OpenBSD
We are constantly on the lookout for stories of how you put OpenBSD to work. Please submit any informative articles on how OpenBSD is helping your company.
OpenBSD 7.8
| 005 | 2025-10-31 SECURITY smtpd(8) can die if a malformed imsg is sent on the local socket. CVE-2025-62875 |
| 004 | 2025-10-28 RELIABILITY Ensure the group selected by a TLSv1.3 server for a HelloRetryRequest is not one for which the client has already sent a key share. |
| 003 | 2025-10-28 SECURITY DNS cache poisoning vulnerabilities in unbound could lead to domain hijacking. CVE-2025-11411 |
| 002 | 2025-10-28 SECURITY Use-after-free and integer overflow in the Xkb and Present X server extensions. CVE-2025-62229 CVE-2025-62230 CVE-2025-62231 |
| 001 | 2025-10-26 RELIABILITY syspatch(8) is confused by aliased /dev/*rootdisk nodes in the database generated by dev_mkdb(8). If syspatch fails (probably because /usr is not a separate filesystem), perform these steps: sed -e 's/.checkfs/#checkfs/g' /usr/sbin/syspatch > /root/syspatch ksh /root/syspatch syspatch # re-run new syspatch command as instructed rm /root/syspatch dev_mkdb |
OpenBSD 7.7
| 014 | 2025-10-31 SECURITY smtpd(8) can die if a malformed imsg is sent on the local socket. CVE-2025-62875 |
| 013 | 2025-10-28 RELIABILITY Ensure the group selected by a TLSv1.3 server for a HelloRetryRequest is not one for which the client has already sent a key share. |
| 012 | 2025-10-28 SECURITY DNS cache poisoning vulnerabilities in unbound could lead to domain hijacking. CVE-2025-11411 |
| 011 | 2025-10-28 SECURITY Use-after-free and integer overflow in the Xkb and Present X server extensions. CVE-2025-62229 CVE-2025-62230 CVE-2025-62231 |
| 010 | 2025-09-30 SECURITY Fix out-of-bounds read and write, memory leaks and incorrect error check for CMS enveloped data. |
| 009 | 2025-09-30 SECURITY In libexpat fix denial of service due to memory exhaustion. CVE-2025-59375 CVE-2024-8176 |
Users wishing RSS/RDF summary files of OpenBSD Journal
can retrieve: 
Options are available.
Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]